Best Practice Internet Gateway Security Policy
    
    One of the cheapest and easiest ways for an attacker to gain access to your network is through
			users accessing the internet. By successfully exploiting an endpoint, an attacker can
			enter your network and move laterally towards the end goal: stealing source code,
			exfiltrating customer data, or taking down infrastructure. To protect your network from
			cyberattacks and improve your overall security posture, implement a best practice
			internet gateway security policy. A best practice policy allows you to safely enable
			applications, users, and content by controlling all traffic, across all ports, all the
			time.
Refer to the Palo Alto Networks series of 
best practices books, which include planning, deployment,
			and maintenance best practices advice on subjects such as: